![]() ![]() If there are multiple accounts on your computer, you will have to do this for each. You can use Spotlight to quickly find Disk Utility or go to. Right click on folder, and choose Get Info and note the size of its contents, this will be very important in. When you are done with using your iMac for work, you can then decrypt and unpack the archive recovering your original personal folder. Click on the menu under Privileges, and select Write Only (Drop Box). Create a new folder and add files that you wish to lock into this folder. So, you make the encrypted archive, delete the original folder, and then use your iMac for work confident that no prying eyes will be able to recover your personal folder's material. ![]() ![]() As the encrypted, compressed, tar archive is encrypted using 4096 bit RSA secret keys, it is secure from prying eyes if that is what you are worried about. 1) Once you open Disk Utility, select File > New Image > Image from Folder from your menu. You can do this using Spotlight Search or opening Applications > Utilities > Disk Utility. Personally, I wrote scripts that employ tar, bzip2, gpg2, shasum, split, cat, and diff to perform these tasks automatically, securely, and robustly, and then additional scripts that merge, decrypt, uncompress, and unpack the tar archive at the other end. In order to encrypt and password protect your folders on Mac, you’ll need to open the Disk Utility and create a disk image of the folder. When I have a folder that I want to be truly secure, and portable, I make a compressed and encrypted tar of it and then split it into subfiles that can be more easily transmitted to another location. It really depends on what you are trying to protect, and from whom, and how serious you are about protecting your personal information.Ĭertainly, following NoBoMac's suggestion is a good one, but if you are logging into a work VPN then simply having a "work" account won't necessarily protect your "personal" account from the administrators at work.Ī more secure method would be to run a Virtual Machine on your iMac for your work-related work, thereby limiting your work's access to the VM.
0 Comments
Leave a Reply. |